| Summary: | security update: java-openjdk | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Manuel Hiebel <manuel.mageia> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | davidwhodgins, dmorganec, luigiwalser, sysadmin-bugs, tmb |
| Version: | 1 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Source RPM: | java-1.6.0-openjdk | CVE: | |
| Status comment: | |||
|
Description
Manuel Hiebel
2011-12-27 02:27:57 CET
java-1.6.0-openjdk-1.6.0.0-24.b22.1mdv2010.2 is the version in 2010.2, and since 24 > 14, I don't think the version in mga1/core/updates_testing is new enough to supercede that one. CC:
(none) =>
luigiwalser The versioning on this package doesn't make sense and I imagine doesn't follow normal policy. Looking at the package changelogs, it appears "b22" is the upstream version. This version matches between MDV and this proposed update. The "14" or "24" is actually the package version, which is usually supposed to go after the software version. It looks like during the MDV 2010.1/2010.2 updates cycle, someone misunderstood the way the package versions were being done on this package (understandable, since it was being done in a non-standard way), and added a second package version after the software version (where it's supposed to go), hence the ".1mdv2010.2" in the MDV version and the ".6.1.mga1" in this proposed update. I'm not sure how you want to handle this, but for the purposes of Mageia 1, it would be sufficient to just change the "14" to "24" and rebuild this proposed update. For Cauldron this mess should probably be fixed, the "14/24" should probably be eliminated, and an epoch should probably be added to the package. For the record, this proposed update package installs and the Java plugin test works fine. just workarounded by increasing release tks Assignee:
dmorganec =>
qa-bugs Testing complete on i586 for the srpm java-1.6.0-openjdk-1.6.0.0-24.b22.6.1.mga1.src.rpm No poc found, so just testing that java works running a previously compiled program. $ java HelloWorldApp Hello World! CC:
(none) =>
davidwhodgins I can confirm icedtea-web still works on i586 with this update. Testing complete on x86_64 with eclipse/ play framework of little apps. Advisory ------------- This update addresses the following CVEs: - S7000600, CVE-2011-3547: InputStream skip() information leak - S7019773, CVE-2011-3548: mutable static AWTKeyStroke.ctor - S7023640, CVE-2011-3551: Java2D TransformHelper integer overflow - S7032417, CVE-2011-3552: excessive default UDP socket limit under SecurityManager - S7046823, CVE-2011-3544: missing SecurityManager checks in scripting engine - S7055902, CVE-2011-3521: IIOP deserialization code execution - S7057857, CVE-2011-3554: insufficient pack200 JAR files uncompress error checks - S7064341, CVE-2011-3389: HTTPS: block-wise chosen-plaintext attack against SSL/TLS (BEAST) - S7070134, CVE-2011-3558: HotSpot crashes with sigsegv from PorterStemmer - S7077466, CVE-2011-3556: RMI DGC server remote code execution - S7083012, CVE-2011-3557: RMI registry privileged code execution - S7096936, CVE-2011-3560: missing checkSetFactory calls in HttpsURLConnection Other fixes in this release: - RH727195 : Japanese font mappings are broken - Backports - S6826104, RH730015: Getting a NullPointer exception when clicked on Application & Toolkit Modal dialog - Zero/Shark - PR690: Shark fails to JIT using hs20. - PR696: Zero fails to handle fast_aldc and fast_aldc_w in hs20. - Sync with cauldron version - Resolves: rhbz#709375 - Bumped to IcedTea6 1.10.2 - RH706250, S6213702, CVE-2011-0872: (so) non-blocking sockets with TCP urgent disabled get still selected for read ops (win) - RH706106, S6618658, CVE-2011-0865: Vulnerability in deserialization - RH706111, S7012520, CVE-2011-0815: Heap overflow vulnerability in FileDialog.show() (win) - RH706139, S7013519, CVE-2011-0822, CVE-2011-0862: Integer overflows in 2D code - RH706153, S7013969, CVE-2011-0867: NetworkInterface.toString can reveal bindings - RH706234, S7013971, CVE-2011-0869: Vulnerability in SAAJ - RH706239, S7016340, CVE-2011-0870: Vulnerability in SAAJ - RH706241, S7016495, CVE-2011-0868: Crash in Java 2D transforming an image with scale close to zero - RH706248, S7020198, CVE-2011-0871: ImageIcon creates Component with null acc - RH706245, S7020373, CVE-2011-0864: JSR rewriting can overflow memory address size variables ------------- SRPM: java-1.6.0-openjdk-1.6.0.0-24.b22.6.1.mga1.src.rpm (hope there is nothing related to this one ) Could sysadmin please push from core/updates_testing to core/updates Thankyou! Keywords:
(none) =>
validated_update Update pushed. Status:
NEW =>
RESOLVED |